Network TAPs and NPBs
Network Packet Brokers (NPB)
Optimize the performance of network analysis and security tools
The main function of Network Packet Broker (NPB) is to filter specific network traffic to a specific monitoring tool, in order to optimize security and traffic flow. They are usually rack mounted and have copper or fiber inputs, and in many cases, both.
By maintaining a many-to-many (M:M) port mapping of network ports to monitoring ports, they can then direct network traffic more efficiently. This enables network engineers to filter on actionable data only, which allows the network tools to analyze much more efficiently.
Flawless monitoring of your fiber networks
Designed to enable flawless in-line monitoring of 1G, 10G, 40G and 100G fiber networks, our Fiber TAPs monitor all 7 OSI layers, packets of all sizes and types and low-level errors. They are non-intrusive, have no IP address and isolate monitoring devices from the network for complete security.
Complete visibility of your entire Ethernet network
Profitap Ethernet TAPs seamlessly duplicate full-duplex 10M/100M/1G/10G traffic at wire speed. Our TAPs provide monitoring devices with traffic as if they were in-line, allowing them to view all 7 layers, including packets of all sizes and types, as well as low-level errors.
The most effective way to monitor your fiber or copper networks
For situations where you want to monitor a single, critical network segment using several tools, a Regeneration TAP is what you need. Unlike an aggregation TAP, a regeneration TAP copies traffic from ONE network segment and sends it to MANY network monitoring tools simultaneously (1:M).
That crucial network segment’s traffic could then be monitored by an intrusion detection system (IDS), recorded for later forensic examination, captured for future use, or analyzed for performance issues. This type of TAP is useful when a critical segment needs to be monitored by an array of security and compliance tools simultaneously.
Enhance your ROI with up to 800%
Aggregation TAPs connect MANY network ports to ONE monitoring port (M:1), combining the two incoming traffic streams into a single flow of outgoing traffic.
For example, in a basic setup, there are two network ports but only one ‘output’, or monitoring, port M. Network traffic entering ports A and B from each direction is then combined or merged to form a single stream of traffic. This is especially useful when that single monitoring tool has a limited number of ports.
Keep your network operational at all times
Bypass TAPs can support active in-line network security and performance tools. They were designed to avoid the “single point of failure” problem with other security appliances.
In the event that an active tool fails, either due to a hardware malfunction, power loss, or software problem, a bypass TAP will keep the link flowing, while a redundant path can be activated. This way it acts as a fail-safe point of access, for in-line network monitoring tools.
For more information, please contact us!